TUCoPS :: Unix :: Various Flavours :: cdmount.htm

Cdmount possible root compromise





    Following is based on Internet Security Systems Security Advisory.
    The  AIX  cdmount  program  allows  regular  users to mount CD-ROM
    filesystems.  This program is basically a SUID to root wrapper  of
    the mount command.  Insecure handling of the arguments to  cdmount
    may allow a local regular user to execute commands as root.  Local
    users may gain root privileges.

    Affected systems are AIX systems with the LPP UMS.objects
    and below installed.   Use the command  'lslpp -l UMS.objects'  to
    verify if a vulnerable version is installed.

    The cdmount program  is part of  the AIX UltiMedia  Services (UMS)
    package. UMS provides multimedia applications to AIX workstations.
    The cdmount program is normally used as a helper to UMS multimedia
    players.  It has SUID  root permissions to allow regular  users to
    mount a  CD-ROM.   The system()library  subroutine is  used within
    cdmount  to  invoke  the  mount  program..  This subroutine spawns
    a shell to  execute the mount  command with arguments  provided by
    the user.  An attacker  may execute arbitrary commands as  root by
    calling cdmount with arguments containing shell metacharacters.


    ISS recommends removing the SUID bit from cdmount by executing the
    following command:

        # chmod 555 /usr/lpp/UMS/bin/cdmount

    IBM  is  currently  working  on  the  following  APAR  (Authorized
    Problem Analysis Report), which will be available soon:

        APAR 4.3.x:  IY10903

    Until the official fix is available, if UMS is not being used  IBM
    recommends uninstalling UMS or removing the SUID bit from cdmount.
    APARs  may  be  ordered  using  Electronic  Fix  Distribution (via
    FixDist) or from the IBM Support Center.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH